top of page
  • Writer's pictureKaty Morgan

Introduction to ISC2 Information Systems Security Management Professional (CISSP-ISSMP) Exam

The ISC2 CISSP-ISSMP Exam is challenging and thorough preparation is essential for success. This exam study guide is designed to help you prepare for the CISSP-ISSMP certification exam. It contains a detailed list of the topics covered on the Professional exam, as well as a detailed list of preparation resources. This study guide for the ISC2 Information Systems Security Management Professional will help guide you through the study process for your certification.

CISSP-ISSMP pdf, CISSP-ISSMP questions, CISSP-ISSMP exam guide, CISSP-ISSMP practice test, CISSP-ISSMP books, CISSP-ISSMP Syllabus, CISSP-ISSMP

CISSP-ISSMP ISC2 Information Systems Security Management Professional Exam Summary


Exam Name: ISC2 Information Systems Security Management Professional

Exam Code: CISSP-ISSMP

Exam Price: $599 (USD)

Duration: 180 mins

Number of Questions: 125

Passing Score: 700/1000

Reference Books:

Schedule Exam: Pearson VUE

Sample Questions: ISC2 CISSP-ISSMP Sample Questions


Exam Syllabus: CISSP-ISSMP ISC2 Information Systems Security Management Professional (CISSP-ISSMP)


Leadership and Business Management - 22%


Establish Security’s Role in Organizational Culture, Vision, and Mission

- Define information security program vision and mission

- Align security with organizational goals, objectives, and values

- Explain business processes and their relationships

- Describe the relationship between organizational culture and security

Align Security Program with Organizational Governance

- Identify and navigate organizational governance structure

- Recognize roles of key stakeholders

- Recognize sources and boundaries of authorization

- Negotiate organizational support for security initiatives

Define and Implement Information Security Strategies

- Identify security requirements from business initiatives

- Evaluate capacity and capability to implement security strategies

- Manage implementation of security strategies

- Review and maintain security strategies

- Describe security engineering theories, concepts, and methods

Define and Maintain Security Policy Framework

- Determine applicable external standards

- Manage data classification

- Establish internal policies

- Obtain organizational support for policies

- Develop procedures, standards, guidelines, and baselines

- Ensure periodic review of security policy framework

Manage Security Requirements in Contracts and Agreements

- Evaluate service management agreements (e.g., risk, financial)

- Govern managed services (e.g., infrastructure, cloud services)

- Manage impact of organizational change (e.g., mergers and acquisitions, outsourcing)

- Monitor and enforce compliance with contractual agreements

Oversee Security Awareness and Training Programs

- Promote security programs to key stakeholders

- Identify training needs by target segment

- Monitor and report on effectiveness of security awareness and training programs

Define, Measure, and Report Security Metrics

- Identify Key Performance Indicators (KPI)

- Relate KPIs to the risk position of the organization

- Use metrics to drive security program development and operations

Prepare, Obtain, and Administer Security Budget

- Manage and report financial responsibilities

- Prepare and secure annual budget

- Adjust budget based on evolving risks

Manage Security Programs

- Build cross-functional relationships

- Identify communication bottlenecks and barriers

- Define roles and responsibilities

- Resolve conflicts between security and other stakeholders

- Determine and manage team accountability

Apply Product Development and Project Management Principles

- Describe project lifecycle

- Identify and apply appropriate project management methodology

- Analyze time, scope, and cost relationship


Systems Lifecycle Management - 19%


Manage Integration of Security into System Development Lifecycle (SDLC)

- Integrate information security gates (decision points) and milestones into lifecycle

- Implement security controls into system lifecycle

- Oversee configuration management processes

Integrate New Business Initiatives and Emerging Technologies into the Security Architecture - Participate in development of business case for new initiatives to integrate security

- Address impact of new business initiatives on security

Define and Oversee Comprehensive Vulnerability Management Programs (e.g., vulnerability scanning, penetration testing, threat analysis)

- Classify assets, systems, and services based on criticality to business

- Prioritize threats and vulnerabilities

- Oversee security testing

- Mitigate or remediate vulnerabilities based on risk

Manage Security Aspects of Change Control

- Integrate security requirements with change control process

- Identify stakeholders

- Oversee documentation and tracking

- Ensure policy compliance


Risk Management - 18%


Develop and Manage a Risk Management Program

- Communicate risk management objectives with risk owners and other stakeholders

- Understand principles for defining risk tolerance

- Determine scope of organizational risk program

- Obtain and verify organizational asset inventory

- Analyze organizational risk management requirements

- Determine the impact and likelihood of threats and vulnerabilities

- Determine countermeasures, compensating and mitigating controls

- Recommend risk treatment options and when to apply them

Conduct Risk Assessments (RA)

- Identify risk factors

- Manage supplier, vendor, and third-party risk

- Understand supply chain security management

- Conduct Business Impact Analysis (BIA)

- Manage risk exceptions

- Monitor and report on risk

- Perform cost–benefit analysis


Threat Intelligence and Incident Management - 17%


Establish and Maintain Threat Intelligence Program

- Synthesize relevant data from multiple threat intelligence sources

- Conduct baseline analysis

- Review anomalous behavior patterns for potential concerns

- Conduct threat modeling

- Identify ongoing attacks

- Correlate related attacks

- Create actionable alerting to appropriate resources

Establish and Maintain Incident Handling and Investigation Program

- Develop program documentation

- Establish incident response case management process

- Establish Incident Response Team (IRT)

- Understand and apply incident management methodologies

- Establish and maintain incident handling process

- Establish and maintain investigation process

- Quantify and report financial and operational impact of incidents and investigations to stakeholders

- Conduct Root Cause Analysis (RCA)


Contingency Management - 10%


Oversee Development of Contingency Plans (CP)

- Analyze challenges related to the Business Continuity (BC) process (e.g., time, resources, verification)

- Analyze challenges related to the Disaster Recovery (DR) process (e.g., time, resources, verification)

- Analyze challenges related to the Continuity of Operations Plan (COOP)

- Coordinate with key stakeholders

- Define internal and external incident communications plans

- Define incident roles and responsibilities

- Determine organizational drivers and policies

- Reference Business Impact Analysis (BIA)

- Manage third-party dependencies

- Prepare security management succession plan

Guide Development of Recovery Strategies

- Identify and analyze alternatives

- Recommend and coordinate recovery strategies

- Assign recovery roles and responsibilities

Maintain Business Continuity Plan (BCP), Continuity of Operations Plan (COOP), and Disaster Recovery Plan (DRP) - Plan testing, evaluation, and modification

- Determine survivability and resiliency capabilities

- Manage plan update process

Manage Recovery Process

- Declare disaster

- Implement plan

- Restore normal operations

- Gather lessons learned

- Update plan based on lessons learned


Law, Ethics, and Security Compliance Management - 14%


Understand the Impact of Laws that Relate to Information Security

- Understand global privacy laws

- Understand legal jurisdictions the organization operates within (e.g., trans-border data flow)

- Understand export laws

- Understand intellectual property laws

- Understand industry regulations affecting the organization

- Advise on potential liabilities

Understand Management Issues as Related to the (ISC)2 Code of Ethics

Validate Compliance in Accordance with Applicable Laws, Regulations, and Industry Best Practices

- Obtain leadership buy-in

- Select compliance framework(s)

- Implement validation procedures outlined in framework(s)

- Define and utilize security compliance metrics to report control effectiveness and potential areas of improvement

Coordinate with Auditors, and Assist with the Internal and External Audit Process

- Prepare

- Schedule

- Perform audit

- Evaluate findings

- Formulate response

- Validate implemented mitigation and remediation actions

Document and Manage Compliance Exceptions


ISC2 CISSP-ISSMP Certification Sample Questions and Answers


To make you familiar with ISC2 Information Systems Security Management Professional (CISSP-ISSMP) certification exam structure, we have prepared this sample question set. We suggest you to try our Sample Questions for ISSMP CISSP-ISSMP Certification to test your understanding of ISC2 CISSP-ISSMPprocess with real ISC2 certification exam environment.


CISSP-ISSMP ISC2 Information Systems Security Management Professional Sample Questions:-


01. Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below:

- System and data are validated.

- System meets all user requirements.

- System meets all control requirements.


a) Programming and training

b) Evaluation and acceptance

c) Definition

d) Initiation

02. Which of the following are known as the three laws of OPSEC?

(Choose three.)


a) If you don't know the threat, how do you know what to protect?

b) If you don't know what to protect, how do you know you are protecting it?

c) If you are not protecting it (the critical and sensitive information), the adversary wins!

d) If you don't know about your security resources you cannot protect your network.

03. Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application.

Which of the following laws are used to protect a part of software?


a) Code Security law

b) Trademark laws

c) Copyright laws

d) Patent laws

04. How many change control systems are there in project management?


a) 3

b) 4

c) 2

d) 1

05. Which of the following statements are true about a hot site?

(Choose two.)


a) It can be used within an hour for data recovery.

b) It is cheaper than a cold site but more expensive than a worm site.

c) It is the most inexpensive backup site.

d) It is a duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data.

06. Which of the following is the default port for Simple Network Management Protocol (SNMP)?


a) TCP port 80

b) TCP port 25

c) UDP port 161

d) TCP port 110

07. Against which of the following does SSH provide protection?

(Choose two.)


a) IP spoofing

b) Broadcast storm

c) Password sniffing

d) DoS attack

08. Which of the following deals is a binding agreement between two or more persons that is enforceable by law?


a) Outsource

b) Proposal

c) Contract

d) Service level agreement

09. What are the steps related to the vulnerability management program?

(Choose three.)


a) Maintain and Monitor

b) Organization Vulnerability

c) Define Policy

d) Baseline the Environment

10. Which of the following security models dictates that subjects can only access objects through applications?


a) Biba-Clark model

b) Bell-LaPadula

c) Clark-Wilson

d) Biba model


Answers:-


Answer 1 :- b

Answer 2 :- a, b, c

Answer 3 :- d

Answer 4 :- b

Answer 5 :- a, d

Answer 6 :- c

Answer 7 :- a, c

Answer 8 :- c

Answer 9 :- a, c, d

Answer 10 :- c

bottom of page